General

  • Target

    f99ec2db853e6fe28df1373ff71ca520cfa43df324fb6e9c46f6af696ba01e46

  • Size

    690KB

  • Sample

    230328-e5qb7sag4w

  • MD5

    2f697aa40cc233e35bb56d9e9c62a6ee

  • SHA1

    eacaf8c2c540cd96b5817bac936607c7a948c156

  • SHA256

    f99ec2db853e6fe28df1373ff71ca520cfa43df324fb6e9c46f6af696ba01e46

  • SHA512

    6e713d2b72e02b03ad79d4efd7441a3fcebf90c02c371505437f9c17109dec394655f317f7327d70db043cc41caf4b769b1b939dac21f5d8e06342b972b8d73d

  • SSDEEP

    12288:cMruy90DrcgvPLW55yj65hLuF9SfMiCVwxFUAIvMFwWfigO/HZ0shSr0jsw:yyZgvPLW5wufan9VwxFjIkwWagQZu04w

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      f99ec2db853e6fe28df1373ff71ca520cfa43df324fb6e9c46f6af696ba01e46

    • Size

      690KB

    • MD5

      2f697aa40cc233e35bb56d9e9c62a6ee

    • SHA1

      eacaf8c2c540cd96b5817bac936607c7a948c156

    • SHA256

      f99ec2db853e6fe28df1373ff71ca520cfa43df324fb6e9c46f6af696ba01e46

    • SHA512

      6e713d2b72e02b03ad79d4efd7441a3fcebf90c02c371505437f9c17109dec394655f317f7327d70db043cc41caf4b769b1b939dac21f5d8e06342b972b8d73d

    • SSDEEP

      12288:cMruy90DrcgvPLW55yj65hLuF9SfMiCVwxFUAIvMFwWfigO/HZ0shSr0jsw:yyZgvPLW5wufan9VwxFjIkwWagQZu04w

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks